The Quantum Threat That's Already Here: Why Your 2025 Data Could Be Stolen in 2035

Quantum computers won't break today's encryption tomorrow, but adversaries are already stealing your encrypted data to crack it in the future. This strategy, called "harvest now, decrypt later," means the quantum computing threat isn't a distant concern for web developers and infrastructure teams. It's happening right now, even though the machines capable of breaking encryption won't exist for an estimated 10 to 20 years .

What Is "Harvest Now, Decrypt Later" and Why Should You Care?

The concept is straightforward but unsettling: nation-state actors and sophisticated adversaries are intercepting encrypted traffic today, storing it in massive databases, and waiting for quantum computers powerful enough to decrypt it in the future. If someone captures your HTTPS traffic in 2025, they could theoretically decrypt it in 2035 without your knowledge . This fundamentally changes the timeline for when quantum computing becomes a practical threat.

For most web developers building consumer applications, the risk is manageable. A 15-minute access token or a short-lived session cookie carries minimal risk, even if intercepted and stored. But for organizations handling healthcare data, defense communications, or long-term financial transactions, the equation shifts dramatically. Any data that needs to remain confidential for decades becomes vulnerable today .

How Many Qubits Does It Actually Take to Break Encryption?

The technical barrier to breaking modern encryption is higher than headlines suggest. To crack RSA-2048, the encryption standard protecting much of today's HTTPS traffic, a quantum computer would need approximately 4,000 stable logical qubits . This is a crucial distinction: logical qubits are different from the physical qubits that IBM and Google currently operate. You need many physical qubits to create one reliable logical qubit because of error correction overhead.

Today's quantum computers have tens or hundreds of physical qubits, but with error rates that make cryptographically relevant algorithms impossible to run. The machines exist, but they're not yet capable of the specific task that matters: breaking encryption . Current estimates place us 10 to 20 years away from machines with sufficient capability, though experts disagree on whether we'll ever reach that threshold.

What Has the U.S. Government Already Done About This?

The National Institute of Standards and Technology (NIST) finalized the first post-quantum cryptography standards in 2024, meaning the mathematical work is complete and agreed upon. The standardization process, which took years of expert consensus, has already concluded . This is significant because it removes one layer of uncertainty: we're not waiting for mathematicians to agree on which algorithms are safe. They already have.

The three algorithms that made the cut are :

  • ML-KEM (formerly CRYSTALS-Kyber): Used for key exchange, allowing two parties to establish a secure connection
  • ML-DSA (formerly CRYSTALS-Dilithium): Used for digital signatures to verify authenticity and integrity
  • SLH-DSA (formerly SPHINCS+): An alternative for digital signatures with different performance characteristics

Major browsers and servers are already experimenting with hybrid key exchange, combining classical algorithms like X25519 with post-quantum algorithms like ML-KEM in the same handshake. If one fails, the other keeps working. If a quantum algorithm turns out to have undiscovered vulnerabilities, the classical one provides a safety net .

Steps to Assess Your Quantum Computing Risk Today

As a full-stack developer, you likely make architecture decisions that affect your organization's long-term security posture. Here's how to evaluate your current exposure:

  • Audit asymmetric algorithms in your codebase: Search for RSA, ECDH, ECDSA, and DH implementations. These are the algorithms vulnerable to quantum attacks via Shor's algorithm. If data signed or encrypted with these methods needs to remain valid past 2035, prioritize replacement
  • Evaluate token and certificate lifetimes: A JWT that expires in one hour carries virtually zero post-quantum risk, even if intercepted and stored. A legal document signing certificate or long-term authentication credential carries significant risk. The lifetime of what you're signing or encrypting determines the urgency
  • Review symmetric encryption usage: AES-256, ChaCha20-Poly1305, and SHA-256 remain secure in a quantum world. Grover's algorithm weakens them by requiring double the bits to break, but 256-bit keys have sufficient headroom. These don't require immediate replacement
  • Monitor OpenSSL, nginx, and Node.js updates: Post-quantum cryptography will likely reach most web developers transparently through standard library updates. You won't need to do anything immediately, but staying current with security patches becomes more critical

Why Most Quantum Computing Headlines Get the Timeline Wrong

When Google or IBM announce a quantum computing milestone, media coverage often frames it as "they can now break encryption." This is almost never accurate. The distinction matters for understanding real risk .

"Quantum advantage" means a quantum computer solved a specific problem faster than a classical computer. That problem is usually contrived and designed to make the quantum computer look good. "Cryptographically relevant quantum computing" is a much higher bar. It means the quantum computer can actually break the encryption protecting real-world data. These are not the same thing .

Password hashing algorithms like bcrypt, scrypt, and Argon2 use symmetric hash functions. Grover's algorithm cuts their security in half, but modern implementations like Argon2 with current parameters have plenty of margin. You don't need to change your authentication system right now .

The Real Problem: Infrastructure Built Today Runs in 2035

The most dangerous error for developers is ignoring quantum computing because "it's far away." Infrastructure chosen today often runs in production for a decade or more. If you're building something that will handle sensitive data for decades, the timeline matters .

Full-stack developers in 2025 make architecture decisions that used to belong to operations teams. That includes which cryptographic library you use, how you sign tokens, and what kind of certificates you request. These choices have consequences that extend well beyond the current year. A system deployed in 2025 might still be running in 2035, processing data that adversaries captured and stored years earlier .

The practical takeaway is straightforward: if you're building long-term infrastructure, start thinking about post-quantum cryptography now. You don't need to migrate everything immediately, but understanding your attack surface and planning a transition timeline is prudent. The standardization work is done. The tools are coming. The only question is whether your organization will be ready when the threat becomes imminent.